General

  • Target

    28c56773f4cf7814c4732ca1d9c2da50_NEIKI

  • Size

    210KB

  • MD5

    28c56773f4cf7814c4732ca1d9c2da50

  • SHA1

    0ed01c46873ff246d2a9a7a2b3256f53067f1ebf

  • SHA256

    955a0cb3e3fc0d977a6443b20f4d0b7ed430aad699182f95d5cb86b0184fdf3e

  • SHA512

    963837b87ee6ca8fdd9f29d1d508813e294e2bdbb8bd407ce9527ff3826ef6651e1f077c09f0e3292823038c8552f58f6d1f2a5091c6df971453bba1031f8cf8

  • SSDEEP

    6144:rH/MpjLyA0l5h1VtyLE89LmshoE6gaSp4LOQ:rHPA0jVtyLHhoExa/N

Score
6/10

Malware Config

Signatures

  • Malformed or missing cross-reference table in PDF

    Malformed or missing cross-reference tables are often used to evade detection

Files

  • 28c56773f4cf7814c4732ca1d9c2da50_NEIKI
    .pdf